⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2021-43711Command Injection in Ex200 Firmware

CWE-77Command Injection5 documents5 sources
Severity
9.8CRITICALNVD
EPSS
20.0%
top 4.52%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJan 4
Latest updateAug 19

Description

The downloadFlile.cgi binary file in TOTOLINK EX200 V4.0.3c.7646_B20201211 has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDtotolink/ex200_firmware4.0.3c.7646_b20201211

🔴Vulnerability Details

3
GHSA
GHSA-chwf-9c6x-wv85: The downloadFlile2022-01-05
CVEList
CVE-2021-43711: The downloadFlile2022-01-04
VulnCheck
totolink ex200_firmware Improper Neutralization of Special Elements used in a Command ('Command Injection')2021

🕵️Threat Intelligence

1
Unit42
Network Security Trends: Recent Exploits Observed in the Wild Include Remote Code Execution, Cross-Site Scripting and More2022-08-19
CVE-2021-43711 — Command Injection in Ex200 Firmware | cvebase